Research Article

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Figure 13

Latency vs. distance between SN to sink node.